1.
Which is not DML Command?
Correct Answer
D. Create
Explanation
The given question asks for a DML (Data Manipulation Language) command that is not included in the options. The options provided are Delete, Select, Update, and Create. Out of these options, Create is the correct answer as it is a DDL (Data Definition Language) command used to create database objects such as tables, indexes, or views. DML commands are used to manipulate data within the database, while DDL commands are used to define the structure of the database.
2.
The “all-or-none” property is commonly referred to as ________
Correct Answer
Atomicity
Explanation
The "all-or-none" property refers to the concept of atomicity. In computer science, atomicity means that a transaction or operation is treated as a single, indivisible unit. It either happens completely or not at all, without any partial or incomplete results. This property ensures that if an operation fails or is interrupted, the system will roll back to its previous state, maintaining data integrity. Therefore, the correct answer for this question is atomicity.
3.
Execution of translation in isolation preserves the _________ of a database
Correct Answer
B. Consistency
Explanation
The execution of translation in isolation preserves the consistency of a database. This means that when multiple transactions are executed concurrently, the database remains in a consistent state throughout. Consistency ensures that all data in the database follows predefined rules and constraints. It guarantees that any changes made to the database are valid and do not violate any integrity constraints. Therefore, maintaining consistency is crucial to ensure the accuracy and reliability of the database.
4.
Which of the following is not a transaction state?
Correct Answer
D. Compensated
Explanation
The option "Compensated" is not a transaction state because it is not a standard state in the transaction processing model. In transaction processing, the common states are Active, Partially Committed, and Failed. "Compensated" does not fit into any of these categories and is not recognized as a transaction state.
5.
Is DBMS is software.
Correct Answer
A. True
Explanation
DBMS stands for Database Management System, which is a software that allows users to create, manage, and manipulate databases. It provides an interface for users to interact with the database, perform operations such as data insertion, deletion, and retrieval, and ensures data integrity and security. Therefore, DBMS is indeed a software, making the answer "True" correct.
6.
The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.
Correct Answer
B. Shadow Paging
Explanation
Shadow Paging is a scheme that uses a page table containing pointers to all pages. In this scheme, the page table itself and all updated pages are copied to a new location. This ensures that the original data remains unmodified during the copying process, allowing for consistent and reliable data access. Therefore, the correct answer is Shadow Paging.
7.
If a transaction does not modify the database until it has committed, it is said to use the ___________ technique.
Correct Answer
C. Deferred-modification
Explanation
Deferred-modification is the correct answer because in this technique, a transaction does not modify the database immediately. Instead, the modifications are kept in a separate area called the "transaction log" until the transaction is committed. This allows for better concurrency control and recovery mechanisms, as the modifications can be easily rolled back or undone if needed.
8.
Which forms are based on the concept of functional dependency:
Correct Answer
C. 3 NF
Explanation
The answer is 3 NF because the concept of functional dependency is a key principle in 3NF. Functional dependency refers to the relationship between attributes in a database, where one attribute determines the value of another attribute. In 3NF, every non-key attribute must be functionally dependent on the primary key, and there should be no transitive dependencies. This ensures that the database is free from redundancy and anomalies, leading to better data integrity and efficiency.
9.
Which of the following is used to denote the selection operation in relational algebra?
Correct Answer
D. Sigma
Explanation
Sigma is used to denote the selection operation in relational algebra. The selection operation is used to retrieve tuples from a relation that satisfy a specified condition. It acts as a filter, selecting only the tuples that meet the specified criteria. Sigma is commonly represented using the Greek letter sigma (Σ), which is why it is the correct answer in this case.
10.
Which of the following displays the unique values of the column?
SELECT ________ dept_name
FROM instructor;
Correct Answer
D. Distinct
Explanation
The "Distinct" keyword in the SELECT statement is used to display only unique values of the specified column. In this case, it will display the unique values of the "dept_name" column from the "instructor" table.
11.
Which columns will be displayed
SELECT * FROM employee WHERE salary>10000 AND dept_id=101;
Correct Answer
D. All the field of employee relation
Explanation
The correct answer is "All the field of employee relation." This means that when executing the given SQL query, all the columns of the "employee" relation will be displayed in the result. The query specifies a condition where the salary should be greater than 10000 and the department ID should be 101, but it does not specify any specific columns to be displayed. Therefore, the query will return all the columns of the "employee" relation that satisfy the given conditions.
12.
A query in the tuple relational calculus is expressed as:
Correct Answer
C. {t | P(t)}
Explanation
The correct answer is {t | P(t)}. This is the correct representation of a query in the tuple relational calculus. It states that we want to retrieve all tuples t from a relation where the predicate P(t) is true. This notation is commonly used to express queries in the tuple relational calculus.
13.
A set of possible data values is called
Correct Answer
C. Domain
Explanation
In the context of data, a domain refers to the set of possible values that a data attribute can take. It defines the range or the type of values that can be stored in a specific attribute. Therefore, the correct answer is "Domain".
14.
Which command(s) is (are) used to redefine a column of table in SQL?
Correct Answer
C. Alter Table
Explanation
The correct answer is "Alter Table". The ALTER TABLE command is used to modify the structure of an existing table in SQL. It allows you to add, delete, or modify columns in a table. This command is commonly used to redefine a column by changing its data type, size, or constraints. The other options, "Define Table" and "Modify Table", are not valid SQL commands for redefining a column in a table.
15.
True or false? Authorization aims to determine who the user is, and authentication aims to restrict what operations/data the user can access.
Correct Answer
B. False
Explanation
False. The correct answer is that authentication aims to determine who the user is, and authorization aims to restrict what operations/data the user can access. Authentication is the process of verifying the identity of a user, while authorization is the process of granting or denying access to specific resources or actions based on the authenticated user's privileges.
16.
T or F? In role-based access control, each user is assigned one or more roles, and the roles determine which parts of the system the user is allowed to access.
Correct Answer
A. True
Explanation
In role-based access control, each user is assigned one or more roles, which determine the level of access they have within the system. These roles are typically based on the user's job function or responsibilities. By assigning roles to users, the system can easily manage and enforce access permissions, ensuring that users only have access to the parts of the system that are necessary for their role. Therefore, the statement "In role-based access control, each user is assigned one or more roles, and the roles determine which parts of the system the user is allowed to access" is true.
17.
In 2NF
Correct Answer
C. No partial FDs exist
Explanation
The given answer states that in 2NF, no partial functional dependencies (FDs) exist. This means that for a given relation in 2NF, no non-key attribute is functionally dependent on only a part of the primary key. In other words, all non-key attributes in the relation are fully dependent on the entire primary key. This is an important characteristic of 2NF, as it helps eliminate redundancy and ensures data integrity in the database.
18.
Which one of the following uniquely identifies the elements in the relation?
Correct Answer
B. Primary Key
Explanation
The primary key uniquely identifies the elements in a relation. It is a column or a set of columns in a table that uniquely identifies each row in that table. No two rows can have the same primary key value, ensuring data integrity and uniqueness.
19.
Drop Table cannot be used to drop a table referenced by a _________ constraint.
Correct Answer
D. Foreign Key
Explanation
The DROP TABLE statement is used to remove a table from the database. However, if a table is referenced by a foreign key constraint, it cannot be dropped using the DROP TABLE statement. This is because the foreign key constraint ensures referential integrity between tables, and dropping the table would violate this constraint. Therefore, the DROP TABLE statement cannot be used to drop a table referenced by a foreign key constraint.
20.
Which one of the following is a procedural language?
Correct Answer
C. Relational algebra
Explanation
Relational algebra is a procedural language used to manipulate and query relational databases. It provides a set of operations to retrieve, modify, and combine data stored in tables. Unlike declarative languages like domain relational calculus and tuple relational calculus, which focus on specifying what data is needed without specifying how to retrieve it, relational algebra focuses on the procedural steps and operations required to achieve the desired results. Therefore, the correct answer is relational algebra.